General

  • Target

    1144d0448fefe26f5b9db7e7a7522c9a46eded3a603daa903052373cecc92b27.exe

  • Size

    188KB

  • Sample

    250410-j89mgawvb1

  • MD5

    db804c3f55c5d09dace40c76c99cab52

  • SHA1

    e170f46854f3ccda006528b14ff09ecf5756cf5e

  • SHA256

    1144d0448fefe26f5b9db7e7a7522c9a46eded3a603daa903052373cecc92b27

  • SHA512

    dc3775844855ce5a8436cdcde4a2f03bd0dac73ed5ac89ab94e2bdc5f1891ea347a6a89db7224e6522ac58ba61e0e9efba1695e23828eeb65853a336553e1a47

  • SSDEEP

    3072:Z0bRbeSCuF7PXuwFyoJ+mKTrZYzXlEmS6ZCHOoSnEYXosMM:Z2FeSCulPXuwIoWT9YlhD4dM

Malware Config

Targets

    • Target

      1144d0448fefe26f5b9db7e7a7522c9a46eded3a603daa903052373cecc92b27.exe

    • Size

      188KB

    • MD5

      db804c3f55c5d09dace40c76c99cab52

    • SHA1

      e170f46854f3ccda006528b14ff09ecf5756cf5e

    • SHA256

      1144d0448fefe26f5b9db7e7a7522c9a46eded3a603daa903052373cecc92b27

    • SHA512

      dc3775844855ce5a8436cdcde4a2f03bd0dac73ed5ac89ab94e2bdc5f1891ea347a6a89db7224e6522ac58ba61e0e9efba1695e23828eeb65853a336553e1a47

    • SSDEEP

      3072:Z0bRbeSCuF7PXuwFyoJ+mKTrZYzXlEmS6ZCHOoSnEYXosMM:Z2FeSCulPXuwIoWT9YlhD4dM

    • HelloKitty Ransomware

      Ransomware family which has been active since late 2020, and in early 2021 a variant compromised the CDProjektRed game studio.

    • Hellokitty family

    • Renames multiple (180) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks